Sciweavers

8636 search results - page 1477 / 1728
» How Developers Copy
Sort
View
EDOC
2011
IEEE
14 years 3 months ago
UML Metamodel-based Workflow Modeling and Execution
—In this paper, we present a UML metamodel-based approach for creating and executing workflow models. The modeling language is introduced through its abstract syntax, and an eval...
Jens Brüning, Martin Gogolla
EMNLP
2011
14 years 3 months ago
Learning Sentential Paraphrases from Bilingual Parallel Corpora for Text-to-Text Generation
Previous work has shown that high quality phrasal paraphrases can be extracted from bilingual parallel corpora. However, it is not clear whether bitexts are an appropriate resourc...
Juri Ganitkevitch, Chris Callison-Burch, Courtney ...
112
Voted
IACR
2011
85views more  IACR 2011»
14 years 3 months ago
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
The hardware-attractive block cipher family KTANTAN was studied by Bogdanov and Rechberger who identified flaws in the key schedule and gave a meet-in-the-middle attack. We revis...
Martin Ågren

Publication
209views
14 years 3 months ago
An Exploratory Study on Open Conversation Spaces in Global Software Engineering
Software engineering is by nature a highly collaborative activity and being able to collaborate effectively is a key factor for project success. However, collaborating effectivel...
Kevin Dullemond, Ben van Gameren, Rini van Solinge...
CSCW
2012
ACM
13 years 11 months ago
Predicting tie strength in a new medium
We have friends we consider very close and acquaintances we barely know. The social sciences use the term tie strength to denote this differential closeness with the people in our...
Eric Gilbert
« Prev « First page 1477 / 1728 Last » Next »